CN107852652A - The migration session between unauthorized data network and cellular network - Google Patents
The migration session between unauthorized data network and cellular network Download PDFInfo
- Publication number
- CN107852652A CN107852652A CN201680044686.1A CN201680044686A CN107852652A CN 107852652 A CN107852652 A CN 107852652A CN 201680044686 A CN201680044686 A CN 201680044686A CN 107852652 A CN107852652 A CN 107852652A
- Authority
- CN
- China
- Prior art keywords
- network
- data
- computing device
- unauthorized
- cellular network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000001413 cellular effect Effects 0.000 title claims abstract description 100
- 230000005012 migration Effects 0.000 title abstract description 12
- 238000013508 migration Methods 0.000 title abstract description 12
- 238000004891 communication Methods 0.000 claims description 78
- 238000000034 method Methods 0.000 claims description 22
- 230000000977 initiatory effect Effects 0.000 claims description 12
- 230000009471 action Effects 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 10
- 230000007774 longterm Effects 0.000 claims description 4
- 230000015654 memory Effects 0.000 claims description 4
- 230000008569 process Effects 0.000 description 13
- 230000006870 function Effects 0.000 description 12
- 238000004364 calculation method Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 10
- 241000256844 Apis mellifera Species 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 239000003999 initiator Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000004907 flux Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
- H04W72/542—Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
- H04W36/144—Reselecting a network or an air interface over a different radio air interface technology
- H04W36/1446—Reselecting a network or an air interface over a different radio air interface technology wherein at least one of the networks is unlicensed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Abstract
Session switches between unauthorized data network and cellular network.Voice conversation and/or video session can carry out seamless migration between cellular network and unauthorized data network (for example, Wi Fi) with the transit time (for example, less than several seconds) of very little.The switching can occur from unauthorized data network to cellular network or from cellular network to unauthorized data network.During migrating between networks, the log-on data of cache is accessed, with the certification of speed-up computation device switching network.In some configurations, user can specify the preference for being changed between unauthorized data network and cellular network.For example, user can specify the preference that cellular network is used using Wi Fi networks before cellular network or before using Wi Fi networks.
Description
The cross reference of related application
The U. S utility patent Shen for the sequence No.14/814,953 that patent application claims were submitted on July 31st, 2015
Priority please.During sequence No.14/814,953 application is fully incorporated herein by reference.
Background technology
Computing device (such as radio telephone) can terminate (example in both unauthorized data network and cellular network
Such as, receive or initiate) call.For example, when computing device is connected to Wi-Fi network, can be carried out in Wi-Fi network
Calling.When computing device is not connected to Wi-Fi network, calling is likely to be positioned on cellular network.However, in different nets
Calling is migrated between network may cause speech quality poor.
Brief description of the drawings
Detailed description has been described with reference to the drawings.In accompanying drawing, the leftmost one or more numerals of reference represent accompanying drawing
Mark the accompanying drawing occurred first.Make similar or like project is presented with like reference characters in different accompanying drawings.
Fig. 1 is to show the Illustrative environment for the migration session between unauthorized data network and cellular network
Block diagram.
The block diagram for showing system of some implementations according to Fig. 2, the system include being used to migrate between networks
The calling customer terminal application program of communication.
The flow chart of the example process of some implementations according to Fig. 3, the process include communicating from unauthorized
Switching of the data network to cellular network.
The flow chart of the example process of some implementations according to Fig. 4, the process include communicating from unauthorized
Data network 106 arrives the switching of cellular network.
Embodiment
Described herein is to be used to migrate between data network and cellular network at unauthorized (unlicensed)
(transition) technology and system of session (conversation).Using technology described herein, voice and/or video
Session can between cellular network and unauthorized data network (for example, Wi-Fi) with very short transit time (for example,
Less than several seconds) carry out seamless migration.
Can be with from unauthorized data network to cellular network or from cellular network to unauthorized data network
Switch (handover).In some configurations, user can be specified in unauthorized data network and Cellular Networks
The preference of (switch) is changed between network.For example, user can specify before cellular network using Wi-Fi network preference or
Person uses the preference of cellular network before using Wi-Fi network.In other cases, user can be specified using only with utilization
A type of network (for example, honeycomb or data).
In some instances, the migration between cellular network and unauthorized data network occurred in the existing session phase
Between.For example, user can be in evolved UMTS land radio access web (Evolved Universal
Mobile Telecommunications System Terrestrial Radio Access Network, EUTRAN) or
Start session on the cellular network of some other types, and accessed in ession for telecommunication seamless migration to unauthorized Wi-Fi
Network.In other examples, session may begin at unauthorized data network and move to cellular network.
According to some configurations, the signal intensity based on data network, unauthorized data network is moved to or is connected to.
For example, when the signal strength indicator (RSSI) of received Wi-Fi network is higher than -75dBm (or some other values), can
To initiate the migration to Wi-Fi network.RSSI is the power level that access point of the computing device just out of data network receives
Measured value.Similarly, when the signal strength indicator (RSSI) of received Wi-Fi network is less than some particular value (example
Such as, -85dBm, -75dBm or some other values) when, existing session can move to honeybee from unauthorized data network
Nest network.
In some instances, subscriber endpoints (UE) (for example, mobile phone) are initiated when to migrate between the different networks.Open
Begin, the computing device that request is switched to heterogeneous networks can be recognized by the wireless service provider associated with computing device
Card.Authentication calculations device can assist to prevent the computing device of unauthorized access the network that is attached to wireless service provider or
Service.For the time that the migration improved between network is spent, the log-on data of cache is accessed to accelerate to fill to calculating
Put the certification of switching network.For example, can be obtained from the cache of cellular network it is previously having been obtained from computing device and/or
The log-on message used in the earlier registration of computing device.So, can be quickly compared to traditional registration and authentication mechanism
Perform certification.After being certified, session (session) is established in computing device request on the network being just migrated to, and
Disconnected with current network.For example, if session is using unauthorized number using cellular network, computing device request
Start communication session according to network, and terminate the communication session on wireless network.Break in request with the network being being currently used
During opening the time between connection and actual switch-off connection, communication path is established in new network.Establishing new communication lines
After footpath, the switching from current network to new network is performed.On Fig. 1-4, more details are provided below.
Fig. 1 is to show the Illustrative environment for the migration session between unauthorized data network and cellular network
100 block diagram.Environment 100 can include cellular network 102, and it is operated by wireless service provider.Cellular network 102 can be
Universal Terrestrial Radio Access Network network (UTRAN), evolution UTRAN networks (E-UTRAN) (for example, Long Term Evolution (LTE)), the whole world are moved
The cellular network 102 of dynamic communication system (GSM) EDGE Radio Access Networks (GERAN) or some other types.Generally, environment
100 can provide IP multimedia subsystem (IMS) 104, and it supports to take by the communication of Session initiation Protocol (SIP) infrastructure
Business.As illustrated, environment 100 includes unauthorized data network 106 (for example, Wi-Fi).Environment 100 is in simplified form
Show, and more components can be included.
As shown in figure 1, environment 100 includes UE (such as utilizing the computing device 108 of application program 110), gateway (S-
GW 112), mobility management entity (MME 114), home subscriber servers (HSS116), packet gateway (P-GW 118), recognize
Card, authorization and accounting component (AAA 124), such as ePDG122 etc gateway and access point 126.Although it is not shown,
More multicompartment can be included in environment 100.For example, environment 100 can include eNodeB, Multimedia resource function controller (MRFC)
(MRFC), Multimedia resource function processor (MRFP) (MRFP), proxy CSCF (P-CSCF), inquiry CSCF (I-CSCF) etc..
S-GW 112 can serve as the terminal of the packet data interface towards cellular network 102 (for example, E-UTRAN).Come
The packet of cellular autofluorescence network 102 is route by S-GW 112.S-GW 112 serves as the local mobile anchor of computing device 108.
MME 114 can provide function for subscriber and session management.MME 114 can be contained in bearing activation and it goes
Activate in program, and can be responsible for the certification users of HS 116.MME 114 can also be interacted with HSS to determine computing device
108 current location, and communicated with S-GW 112 with the communication session that please be look for novelty.
HSS 116 stores and updated the database for including user subscription information, and user subscription information includes following item, example
Such as, user's identification and addressing (for example, IMSI (International Mobile Subscriber identity) and MSISDN (mobile subscriber ISDN number)), user
Profile information (such as subscribing to data).HSS 116 can be additionally configured to perform other operations.
P-GW 118 serves as cellular network 102 and other packet data network (for example, unauthorized data network 106
Or the IMS 104 based on SIP) between interface.AAA 12 provides function in terms of supporting user and cellular network service
Calculate certification, the authorization and accounting of device.EPDG 122 is provided to computing device 108 by unauthorized data network 106 and connect
Access point, to access the service provided by wireless service provider.Access point 126 allows wireless device (for example, computing device 108)
It is connected to unauthorized data network 106.
Apps server 126 handles and explains message, such as sip message.In some configurations, it is one or more
Individual apps server 106 is configured to one or more application programs and provides support, for example, application program 110.
Although apps server 126 is illustrated in IMS 104, other one or more computing devices can be located at
IMS 104 outside.For example, either some other servers or device can be via one or more for apps server
Individual external packet-switched (for example, internet) is connected to IMS 104.
According to some configurations, calling customer terminal application program (for example, application program 110) on computing device 108 can be with
Data are established via P-GW 118 with IMS 104 by data connection to communicate.In some instances, application program 110 can be
Calling appl., its request is conversed using cellular network 102 and/or unauthorized data network 106, (for example, language
Sound and/or video).Application program 110 may be configured to determine that when from cellular network 102 move to unauthorized data network
Network 106 and/or when from unauthorized data network 106 move to cellular network 102.It is for example, such as hereinafter more detailed
Ground discussion, computing device 108 can be based on user preference and the availability of unauthorized data network and cellular network
To determine when to migrate between networks.
According to some configurations, the application program 110 on computing device 108 can be via unauthorized data network 106
It is connected to apps server 126 or some other components.In this case, application program 110 can access via Wi-Fi
Put 126 and be connected to network 106.Therefore, the data traffic from application program 110 can be routed to using journey by gateway 122
Sequence server 106.In other configurations, application program 110 can be connected to apps server via cellular network 102
126 or some other components.
In some cases, before computing device 108 is connected to cellular network 102 and/or provide by with Cellular Networks
Before the service that the associated wireless service provider of network 102 provides, computing device 108 is certified.For example, application program service
Device 106 can be authorized to use the service from IMS 104 with authentication calculations device 108.According to some configurations, in order to improve in honeybee
The spent time is migrated between nest network and unauthorized data network, accesses the log-on data of cache with accelerometer
Calculate the certification of device switching network.For example, can be obtained from the cache of cellular network previously obtained from computing device and/
Or the log-on message used in the earlier registration of computing device.Cache can be with apps server 126, HSS
116th, AAA 124, MME 114, gateway 122 or some other devices or component associated with cellular network are associated.In this way,
Log-on message obtained during the earlier registration of computing device or generation can be utilized, rather than must be spent from Cellular Networks
Computing device and other assemblies in network obtain the time needed for log-on message.In some instances, it is sharp in computing device
With a period of time (such as 5 minutes, 10 minutes) during time of the service associated with cellular network and afterwards, registration letter
Breath is cached.
Computing device 108 and other users end points computing device can include being used to utilize gateway 122 (for example, ePDG)
The component and/or function of ipsec tunnel are established on unauthorized data network 106.According to some examples, gateway 116 connects
P-GW 118 is connected to, it is connected to cellular network 102.EPDG can support different IMS services, such as, but not limited to LTE
Upper voice (VoLTE), Wi-Fi callings (WFC), video call (VC), rich communication suite (RCS) etc..
Such as Brief Discussion, computing device 108 can ask to initiate to communicate.According to some examples, the request can be hair
Play the request of the electronic communication (for example, SMS or MMS) of audio call, video call or some other types.In some configurations
In, network availability and user preference determine whether to establish in unauthorized data network 106 or cellular network 102
Communication.For example, when user has specified that the preference called using Wi-Fi, if unauthorized data network 106 can not
With (for example, the signal intensity of data network does not have data network less than the threshold value specified or in the range of), then honeybee can be used
Nest network 102 establishes communication.In other examples, when the signal intensity of network is higher than the threshold value specified and user has caused
Can be when data network be communicated, then communication can be established initially on unauthorized data network 106.
For task of explanation, it is assumed that initially establish voice communication using cellular network 102.As discussed above, communicate
It can be carried out on any kind of cellular network.In some instances, called in EUTRAN (for example, LTE).In voice
Sometime, unauthorized data network 106 can be transferred to communication period by being determined communication.For example, calculate dress
Put 108 can detect for unauthorized data network 106 RSSI instruction be connected to unauthorized network 106 for
Voice communication is acceptable.In some instances, when RSSI is -75dBm or is more preferable, application program 110 determines will communication
Unauthorized data network 106 is moved to from cellular network 102.In other examples, different signal intensities can be utilized
Threshold value.
, can be with after it is determined that moving to different network (being unauthorized data network 106 in this case)
Authentication calculations device 108.It is, for example, possible to use AAA 124 and HSS 116 carry out authentication calculations device 108.As discussed above,
Allow computing device 108 move to heterogeneous networks before authentication calculations device 108 can aid in prevent unauthorized access by
The service that wireless service provider provides.Also as discussed above, calculating can be improved using the log-on data of cache
The speed of registration and the certification of device 108.
In some configurations, the request of computing device 108 moves to unauthorized wireless network 106.According to some examples,
EPDG 122 is issued to P-GW 118 and is created session request, to ask the communication path on unauthorized data network 106.Wound
Build session request and start switching from cellular network 102 to unauthorized data network 106.
In response to receiving establishment session request, P-GW 118 sends " deleting bearing request information, S- to S-GW 112
GW 112 forwards the message to MME 114, to start to disintegrate the communication path on cellular network.Receive and delete in P-GW 118
After being responded except carrying, calling can be re-routed to by P-GW 118 using automatic alternating path by (AAR) from cellular network 102
Unauthorized data network 106.The certification provided by AAA 122, authorization and accounting function can be used to be filled come authentication calculations
Put 108.In some instances, as discussed above, the log-on data associated with computing device 108 can be in log-on data
120 internally cached a period of time of cache.As long as for example, a period of time (example of computing device 108 and hereafter
Such as, a few minutes) service provided by wireless service provider is provided, it is possible to cache log-on data cache 120.This
Sample, compared with asking the authentication information of the component in environment 100, the certification of computing device 108 can be faster.Match somebody with somebody at some
In putting, when computing device 108 is first connected to cellular network 102 and/or is otherwise connected to IMS 104, number is registered
According to being cached in log-on data cache 120.
After AAA responses are received from MME 114, P-GW 118 is sent to ePDG 122 by conversational response is created, and
And ipsec tunnel is established in unauthorized data network 106, and voice communication is switched to unauthorized data network
Network 106.Voice communication is moved into cellular network 102 (referring to figure from unauthorized network 106 using similar flow
4)。
Fig. 2 is the block diagram for showing system 200 according to some implementations, and the system includes being used to migrate between networks
The calling customer terminal application program of communication.System 200 includes being coupled to the computing device 202 of server 204 via network 206.
Computing device 202 can similarly be configured with computing device 108.Similarly, network 256 can be identical with network 102
Network, and network 258 can be unauthorized data network 106 same as shown in Figure 1.
Computing device 202 can be that radio telephone, tablet personal computer, laptop computer, wrist-watch or other kinds of calculate fill
Put.Computing device can include one or more processors 208 and computer-readable medium, and such as memory is (for example, random
Access memory (RAM), solid-state drive (SSD) etc.), disk drive (such as hard disk drive based on disc), it is another
The computer-readable medium of type or its any combinations.
Computer-readable medium 210 can be used for store instruction to perform various functions and be used for data storage.For example, meter
Calculation machine computer-readable recording medium 210 can include instruction 214, calling customer terminal 216, local dialing device 218, position determination module 220, when
Preceding operator scheme 222 and overlay file 224.Certainly, computer-readable medium 210 can also include it is other kinds of instruction and
Data, operating system, device driver etc..Calling customer terminal 216 can allow the user to be communicated (for example, language
Sound calling, SMS or MMS) and/or determine when existing communication from a network migration to another network.For example, phone is objective
Family end 216 can determine to unauthorized data network 258 connection have enough quality come handle audio call and/or
Video call.
Local dialing device 218 (also referred to as mobile dial device) can be such application program:It makes it possible for meeting
Initiation protocol (SIP) signaling is talked about to initiate to call via voice over internet protocol (VoIP).Position determination module 220 can determine to count
Calculate the current location of device 202.For example, position determination module 220 can determine present bit using global positioning system (GPS)
Put.The current location determined by position determination module 220 can determine pattern 222.For example, if computing device 202 is current
Position is provided in the geographic area covered in the operator associated with the device number 226 of computing device 202, then pattern 222
It can be configured to operator's pattern.If the current location of computing device 202 does not provide the geographic area of covering in operator
In (for example, the position that the radio telephone associated with device number 226 can be roamed normally), then pattern 222 can be set to
Cross top (Over-The-Top, OTT) pattern.
Display device 212 can be separated with computing device 202 or integrated with computing device 202 (for example, such as Fig. 2
It is shown).Display device 212 can show the various information associated with initiating calling.Except as 10 traditional phone numbers
Outside code, device number 226 is also used as Uniform Resource Identifier (URI), for example, being used as Internet protocol (IP) multimedia
Private identity (IMPI), global identity is distributed by the unique permanent of home network operator (for example, operator) distribution.
Destination number 228 can be the number of another user communicate with or calling.In other words, destination number
Code 228 is the position that calling is routed to.
Server 204 can include one or more processors 244 and one or more computer-readable mediums
246.Computer-readable medium 246 can be used for store instruction 248, one or more databases 250, the and of routing module 252
Authentication module 254.Instruction 248 can be performed by processor 244 to perform various functions described here.Database 250 can be with
Database including storage information, such as which addition number are associated with device number etc..Routing module 252 can be used for setting
Put, route and migrate the calling from computing device 202.
Authentication module 254 can perform various types of certifications, including determine whether user is authorized to and be connected to network
206.Network 206 can include one or more networks, such as cellular network 256 and unauthorized data network 258.Honeybee
Nest network 256 can use such as global mobile system (GSM), CDMA (CDMA), universal Mobile Telephone Service (UMTS)
Deng technology come provide wide-area wireless covering.Although between cellular network 256 and computing device (for example, computing device 202)
Communication can be performed using wide area wireless network, but cellular network 256 can include other technologies, such as wired (common
Plain old telephone service (POTS) circuit), optics is (for example, Synchronous Optical Network work (SONET) technology etc..
Unauthorized data network 258 can include being used to transmitting and receiving the various types of of data (for example, packet)
The network of type, the network including the use of following technology:Such as (" Wi- of Institute of Electrical and Electric Engineers (IEEE) 802.11
Fi "), IEEE 8021.15.1 (" bluetooth "), asynchronous transfer mode (ATM), Internet protocol (IP) etc..Term " data network
Network " refers to transmission and the packet received in unauthorized data network 258.Use VoIP or other technologies and data
Flow, packet can be used for carry voice flux.
In some cases, such as upon power-up or with periodic intervals, computing device 202 can use position true
Pattern 222 is arranged to operator's pattern (for example, present bit by cover half block 220 to determine the current location of computing device 202
When putting within the coverage of the operator associated with device number 226) or OTT patterns (for example, current location with dress
When putting outside the coverage of the associated operator of number 226).
Calling customer terminal 216 can send registration request 260 so that computing device 202 to be registered to the net of local operator
Network.For example, registration request 260 can be sent to server 204 by calling customer terminal 216, by computing device 202 be registered to
The associated local operator of network 206.Registration request 260 can be received by server 204, and server 204 can be configured
As service call conversation control function (" S-CSCF ") server or as internet protocol multi-media sub-system (" IMS ")
Some other components of a part.Registration request can include specifying what is registered to one or more apps servers
The feature tag of different characteristic.For example, feature tag can include feature, such as, but not limited to mediaphone (" MMTEL ")
Feature, short message session initiation protocol (" SMSIP ") feature, Futong's telecommunications services (" RCS ") feature etc..Registration request 260 can
To indicate that computing device is (for example, using data network with honeycomb mode (for example, using cellular network 256) or OTT patterns
258) register and specify the preference using a type of network or another type network.In honeycomb mode, dress is calculated
Putting 202 can use cellular network to initiate to call and terminate calling.In OTT patterns, computing device 202 can be used without being permitted
Can data network 258 (for example, via VoIP) initiate to call and terminate calling.
When user it is expected using computing device 202 initiate communication when, calling customer terminal 216 can prompt user selection (or
Person's entrance) destination number 228 (for example, destination of calling).Communication request 262 can be sent to clothes by computing device 202
Business device 204, communication request 262 include institute's assigned unit number 226, initiator device number 230 (if different from what is distributed
Device number 226) and destination number 228.Communication request 262 notifies server 204 to send communication from computing device 202.
After communication request 262 is received, communication request 262, and determination and device number can be certified in authentication module 254
Whether associated account, which is authorized to, is initiated calling.For example, authentication module 254 can be examined from one or more databases 250
Rope accounts information, whether it is authorized to the account for determining associated with computing device 202.In some instances, accounts information or
Other log-on datas can be stored in cache, all log-on data caches 120 as shown in Figure 1 etc..When with dress
Put the associated account of number 226 it is uncommitted when, server 204 can send refusal communication request 262 to computing device 202
Message.When the account associated with device number 226 be authorized to initiate calling when, server 204 can to destination number
The associated one or more computing devices of code 228 are communicated.Server 204 can also be to apps server 108
The communication information as described above is provided, apps server 108 is assigned to handle the request to initiator device number 230.
In Fig. 3 and Fig. 4 flow chart, each frame represent can with hardware, software or its combination come realize one or
More operations.Under the background of software, these frames represent computer executable instructions, and it is by one or more processors
During execution, make the operation described in computing device.Generally, computer executable instructions include performing specific function or realized specific
The routine of abstract data type, program, object, module, component, data structure etc..The order of described block be not intended as by
It is construed to limit, and in any order and/or any amount of described operation can be combined in parallel to realize these
Process.For discussion purposes, as described above, reference system 100,200 describes process 300 and 400, but other models,
Framework, system and environment can realize these processes.
Fig. 3 is to include communication from unauthorized data network 106 to cellular network 102 according to some implementations
The flow chart of the example process 300 of switching.Process 300 can be performed by one or more computing devices, such as on Fig. 1
With the computing device of 2 descriptions.
At 302, request is received from computing device to initiate the communication from originating number to destination number.As above begged for
Opinion, the request can initiate audio call, video call or some other kinds of electronic communications (for example, SMS or MMS)
Request.Also as discussed above, can be communicated on unauthorized data network 106 or cellular network 102.One
In a little configurations, network availability and user preference determine whether that foundation is logical on data network 106 or cellular network 102
Letter.For example, if unauthorized data network 106 is unavailable (for example, the signal intensity of data network is less than the threshold value specified
Or there is no data network in the range of), then communication can be established over a cellular network.In other examples, when the signal of network
, then can be in data network when intensity has made it possible to be communicated over data networks higher than the threshold value and user specified
It is upper to establish communication.For purposes of explanation, Fig. 3 shows moving from cellular network 102 to unauthorized data network 106
Move, and Fig. 4 shows the migration from unauthorized data network 106 to cellular network 102.
At 304, communication is initially established on cellular network 102.As discussed above, communication can be in many differences
Carried out on the cellular network of type.In some instances, called on an LTE network.For example, it can be carried out on EUTRAN
Calling.
At 306, data network (for example, Wi-Fi) is determined during cellular network communication is used and can be used for communicating.
As discussed above, unauthorized data network 106 can be detected by the computing device 108 for initiating communication.Show at some
In example, determine the signal intensity of unauthorized data network 106 for voice by the application program 110 on computing device 108
Communication is acceptable.For example, application program 110 can enter signal intensity and threshold value (such as -75dbm or some other values)
Row compares, to determine that data network will support voice and/or video communication.
At 308, computing device 108 can be certified.As discussed above, gateway 122 can be with one of network 102
Or more component interaction with authentication calculations device 108.For example, ePDG (such as gateway 122) can be with AAA 124 and/or HSS
116 interactions are with authentication calculations device 106.In some instances, can be used for the data of authentication device 108 can be stored in height
In speed caching, such as in log-on data cache 120.When computing device 108 is uncommitted, another network is moved to
Request can be rejected.
At 310, established on unauthorized data network 106 request of communication path.As discussed above,
EPDG 122 can be issued to P-GW 118 and be created conversation request message.Before the communication path in cellular network 102 is terminated,
Establishment session request starts the switching from cellular network 102 to unauthorized data network 106.
At 312, disintegrating for communication path is initiated.In response to receiving establishment session request, P-GW 118 can pass through
Deleting bearing request message is sent to S-GW 116 and deactivates communication path.Deleting bearing can be asked to send by S-GW 116
To MME 114.
At 314, the communication path established on data network.As discussed above, after deleting bearing, P-GW 118
The communication path (for example, IPsec tunnels) in unauthorized data network 106 can be activated.In some instances, P-GW
Calling is re-routed to unauthorized data network 106 by 118 using automatic alternating path by (AAR).
At 316, communication is switched to data network.As discussed above, P-GW 118 can will create conversational response hair
EPDG 122 is sent to, and communicates and is migrated to unauthorized data network 106.
Fig. 4 is to include communication from unauthorized data network 106 to cellular network 102 according to some implementations
The flow chart of the example process 400 of switching.Process 400 can be performed by one or more computing devices, such as on Fig. 1
With the computing device described by 2.
At 402, using the unauthorized communication period of data network 106 determine be transformed into cellular network (for example,
EUTRAN).As discussed above, the company of unauthorized data network 106 can be determined by initiating the computing device 108 of communication
Connect to have lost or connected and no longer there is the acceptable quality for being used for handling voice and/or video communication.In some instances,
Signal intensity is determined by computing device 108 and is less than -85dBm or some other values.
At 404, computing device 108 can issue the request for being attached to cellular network 102.In some instances, calculate
Device 108 issues attachment request to MME 114.Attachment request can trigger one or more processes and be used to calculate dress to establish
Put 108 special EPS carryings.For example, the process can include authentication calculations device 108A, the position (example of computing device is determined
Such as, using HSS), and issued to S-GW 112 and create session request.S-GW 112 can will create session request and be transmitted to P-
GW 118。
At 406, it can start to terminate using the communication session of unauthorized data network 106.For example, P-GW 118
Deleting bearing request can be issued to ePDG 122, and session termination request is issued to AAA 124.
At 408, the communication path established on cellular network 102.As discussed above, after deleting bearing, P-GW
118 can activate the communication path in cellular network 102.In some instances, P-GW118 is transmitted to S-GW 112 and is created session
Response, the response are provided to MME 114.
At 410, in response to receiving establishment conversational response, MME 114 (for example, via EnodeB) and computing device
108 are communicated, to reconfigure communication and communication is attached into cellular network 102.In some instances, MME 114 is to S-
The transmission modification carryings of GW 112 are asked to complete to switch.At 412, communication is switched to the cellular network that communication can continue
102。
Above-mentioned various technologies are assumed to be in given example in computer executable instructions or software (such as program mould
Block) general context in realize, the computer executable instructions or software be stored in computer-readable storage and by
One or more computing devices of one or more computers or other equipment (all those equipment as illustrated in the drawing).
Generally, program module includes routine, program, object, component, data structure etc., and defines for performing particular task or realization
The operation logic of particular abstract data type.
Described function can be realized using other architectural frameworks, and is intended to fall within the scope of the present disclosure.This
Outside, although defining specific responsibility distribution above for the purpose of discussion, as the case may be, various functions and responsibility can
Distribute and distinguish by different way.
Similarly, software can be and above-mentioned specific soft in a variety of ways and using different means storages and distribution
Part, which stores and performed configuration, to be changed in a number of different ways.Therefore, realizing the software of above-mentioned technology can be distributed in respectively
On the computer-readable medium of type, and it is not limited to the form of memory specifically described.
In addition, although describing theme with the language acted specific to architectural feature and/or method, but should manage
Solution, the theme limited in the following claims are not necessarily limited to described specific features or action.On the contrary, specific feature
It is disclosed as realizing the exemplary form of claim with action.
Claims (20)
1. a kind of computer implemented method by being configured with one or more computing devices of specific instruction, the calculating
The method that machine is realized includes:
Communication session is established over a cellular network for computing device, wherein the communication session includes speech data;
It is determined that the computing device is connected to unauthorized data network;
Initiate the connection of the unauthorized data network;
In response to initiating the connection to the unauthorized data network,
Terminate the communication session on the cellular network;And
Using computing device described in the data authentication of cache, the data of the cache include existing with the computing device
The log-on data that earlier registration on the cellular network is associated;And
The communication session is switched to the unauthorized data network.
2. computer implemented method according to claim 1, wherein determine by the computing device be connected to it is described not
Licensed network includes:Determine that the signal intensity of Wi-Fi network exceedes threshold value.
3. computer implemented method according to claim 1, wherein the cellular network is Long Term Evolution (LTE) honeycomb
Network, the unauthorized network is Wi-Fi network, and the computing device is mobile phone.
4. computer implemented method according to claim 1, in addition to:Initiating to arrive the unauthorized data network
Computing device described in certification before the connection of network.
5. computer implemented method according to claim 1, wherein determine by the computing device be connected to it is described not
Licensed data network includes:Access user preference with determine with it is described unauthorized so that the computing device to be connected to
The first condition of the time correlation connection of data network.
6. computer implemented method according to claim 4, wherein the communication session is switched to described without being permitted
Can data network spend be less than two seconds.
7. computer implemented method according to claim 1, wherein computing device described in certification include:By the registration
Data high-speed is buffered in the cache of the cellular network, and is connected to the unauthorized net in the computing device
The log-on data is stored in the cache in a period of time after network.
8. a kind of system, including:
One or more processors;And
One or more memories of store instruction, the instruction are held when by one or more computing device
Action is made, and the action includes:
The use of first network is that client computing devices establish communication session, the first network is for cellular network or without approval
Data network;
Received from the client computing devices and initiate the communication session from the first network to the switching of the second network
Request, wherein the second network described in when the first network is the cellular network is the unauthorized data network,
And the second network described in when the first network is the unauthorized data network is the cellular network;
Initiate the connection of second network;
Using the data of cache come client computing devices described in certification, the data of the cache and the client
Earlier registration of the computing device on the cellular network is associated;
Terminate the communication session on the first network;And
The communication session is switched to second network from the first network.
9. system according to claim 8, wherein initiating the communication session from the first network to second net
The request of the switching of network is based at least partially on the signal intensity of the unauthorized data network.
10. system according to claim 8, wherein the cellular network is Long Term Evolution (LTE) cellular network, Yi Jisuo
It is Wi-Fi network to state unauthorized network.
11. system according to claim 8, wherein the action also includes:Initiating to described in second network
Before connection, from the data of cache described in the cellular cache access.
12. system according to claim 8, wherein being connected to the first network and institute in the client computing devices
During the time for stating the second network, the data of the cache are stored in the cache associated with the cellular network
It is interior.
13. system according to claim 8, wherein the action also includes:Access and specify and the cellular network and institute
State the user preference of the associated connection priority of unauthorized data network.
14. system according to claim 8, wherein the client computing devices determine to initiate the communication session from institute
State the switching of the first network to second network.
15. a kind of non-transitory computer-readable medium for storing computer executable instructions, the computer executable instructions
When executed act one or more computing devices of computing device, the action includes:
The use of first network is that client computing devices establish communication session, the first network is for cellular network or without approval
Data network;
The connection to the second network is initiated, wherein the second network described in when the first network is the cellular network is described
Unauthorized data network, and the second network described in when the first network is the unauthorized data network is institute
State cellular network;
Using the data of cache come client computing devices described in certification, the data of the cache and the client
Earlier registration of the computing device on the cellular network is associated;
Terminate the communication session on the first network;And
The communication session is switched to second network from the first network.
16. non-transitory computer-readable medium according to claim 15, wherein the action also includes:From the visitor
Family end computing device, which receives, initiates the communication session from the first network to the request of the switching of second network.
17. non-transitory computer-readable medium according to claim 16, wherein initiating the request of the switching
It is based at least partially on the signal intensity of the unauthorized data network.
18. non-transitory computer-readable medium according to claim 15, wherein the cellular network is Long Term Evolution
(LTE) cellular network, and the unauthorized network is Wi-Fi network.
19. non-transitory computer-readable medium according to claim 15, wherein the action also includes:Initiating to arrive
Before the connection of second network, the data of cache described in the cache access from the cellular network.
20. non-transitory computer-readable medium according to claim 15, wherein the action also includes:Access and specify
The user preference of the connection priority associated with the cellular network and the unauthorized data network, to determine when
Initiate the connection of second network.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/814,953 US10051644B2 (en) | 2015-07-31 | 2015-07-31 | Transitioning a conversation between an unlicensed data network and a cellular network |
US14/814,953 | 2015-07-31 | ||
PCT/US2016/042587 WO2017023519A1 (en) | 2015-07-31 | 2016-07-15 | Transitioning a conversation between an unlicensed data network and a cellular network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107852652A true CN107852652A (en) | 2018-03-27 |
Family
ID=57883542
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201680044686.1A Pending CN107852652A (en) | 2015-07-31 | 2016-07-15 | The migration session between unauthorized data network and cellular network |
Country Status (4)
Country | Link |
---|---|
US (2) | US10051644B2 (en) |
EP (1) | EP3314944A4 (en) |
CN (1) | CN107852652A (en) |
WO (1) | WO2017023519A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111669790A (en) * | 2019-03-08 | 2020-09-15 | 中国移动通信有限公司研究院 | Cell reselection or redirection method, device, network side equipment and terminal |
CN112314033A (en) * | 2018-05-03 | 2021-02-02 | 诺基亚通信公司 | Selecting and managing network slices |
CN114788313A (en) * | 2019-10-16 | 2022-07-22 | 特鲁丰有限公司 | On-demand network connection |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10051644B2 (en) | 2015-07-31 | 2018-08-14 | T-Mobile Usa, Inc. | Transitioning a conversation between an unlicensed data network and a cellular network |
US10567447B2 (en) * | 2015-10-26 | 2020-02-18 | Mediatek Inc. | Apparatuses and methods for coordinating communication operations associated with a plurality of subscriber identity cards in a mobile communication device with a single wireless transceiver |
US10212627B2 (en) * | 2015-12-11 | 2019-02-19 | Reliance Jio Infocomm Usa, Inc. | Co-existence mechanism for downloadable voice application client |
US11395216B2 (en) * | 2018-10-31 | 2022-07-19 | Comcast Cable Communications, Llc | Voice-over-internet-protocol (VoIP) communications |
US10694457B1 (en) | 2019-02-21 | 2020-06-23 | At&T Intellectual Property I, L.P. | Volte roaming using general purpose packet data access |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070083470A1 (en) * | 2005-10-12 | 2007-04-12 | Cingular Wireless Ii, Llc | Architecture that manages access between a mobile communications device and an IP network |
US20070149195A1 (en) * | 2005-12-27 | 2007-06-28 | Samsung Electronics Co., Ltd. | Apparatus and method for providing seamless handover |
US20080119187A1 (en) * | 2001-02-26 | 2008-05-22 | Gallagher Michael D | Apparatus for Supporting the Handover of a Telecommunication Session Between a Licensed Wireless System and an Unlicensed Wireless System |
CN101730093A (en) * | 2009-02-20 | 2010-06-09 | 中兴通讯股份有限公司 | Safe switching method and system |
US20110019639A1 (en) * | 2009-05-22 | 2011-01-27 | Jeyhan Karaoguz | Enterprise Level Management in a Multi-Femtocell Network |
WO2013106536A2 (en) * | 2012-01-11 | 2013-07-18 | Interdigital Patent Holdings, Inc. | Method and apparatus for accelerated link setup |
CN103392319A (en) * | 2010-12-30 | 2013-11-13 | 交互数字专利控股公司 | Authentication and secure channel setup for communication handoff scenarios |
US20140286309A1 (en) * | 2011-12-23 | 2014-09-25 | Cellco Partnership (D/B/A Verizon Wireless) | Handing over a user device from one technology to another |
US20150208309A1 (en) * | 2014-01-21 | 2015-07-23 | Cisco Technology, Inc. | System and method for seamless mobility in a network environment |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999067967A1 (en) | 1998-06-23 | 1999-12-29 | Siemens Aktiengesellschaft | Method for controlling the handover of telecommunication connections between mobile parts and base stations in cellular telecommunications systems having wireless telecommunication |
US20060052113A1 (en) * | 2004-09-07 | 2006-03-09 | Shai Ophir | Roaming presence and context management |
US7933598B1 (en) * | 2005-03-14 | 2011-04-26 | Kineto Wireless, Inc. | Methods and apparatuses for effecting handover in integrated wireless systems |
US20090061877A1 (en) * | 2006-07-14 | 2009-03-05 | Gallagher Michael D | Generic Access to the Iu Interface |
KR101503839B1 (en) | 2007-07-13 | 2015-03-18 | 삼성전자주식회사 | Apparatus and method for handover of multi-mode portable terminal |
WO2009039318A1 (en) * | 2007-09-18 | 2009-03-26 | Kineto Wireless, Inc. | Method and system for supporting large number of data paths in an integrated communication system |
JPWO2010041440A1 (en) * | 2008-10-08 | 2012-03-08 | パナソニック株式会社 | Interface switching system, mobile node, proxy node and mobility management node |
CN101841876B (en) * | 2009-03-20 | 2013-03-13 | 上海贝尔股份有限公司 | Transfer method and device between unauthorized mobile access network and honeycomb communication network |
US9374744B2 (en) * | 2011-08-10 | 2016-06-21 | Kt Corporation | Apparatus and method for seamless handoff of a service between different types of networks |
TWI477185B (en) * | 2012-10-22 | 2015-03-11 | Hon Hai Prec Ind Co Ltd | Handover controlling system between home nodebs and handover controlling system method thereof |
US9143995B2 (en) * | 2013-02-22 | 2015-09-22 | Cisco Technology, Inc. | System and method for hand-in disambiguation using user equipment WiFi location in a network environment |
US20140269611A1 (en) | 2013-03-14 | 2014-09-18 | T-Mobile Usa, Inc. | Communication Handovers from Networks Using Unlicensed Spectrum to Circuit-Switched Networks |
US9560185B2 (en) * | 2014-03-19 | 2017-01-31 | Microsoft Technology Licensing, Llc | Hybrid telecommunications network connection indicator |
US9456333B2 (en) * | 2014-07-09 | 2016-09-27 | Microsoft Technology Licensing, Llc | Centralized routing in hybrid networks |
US9661530B2 (en) * | 2014-12-12 | 2017-05-23 | Apple Inc. | Data traffic bearer selection based on backhaul statistics |
US20150326636A1 (en) * | 2015-05-08 | 2015-11-12 | Bandwidth.Com, Inc. | Optimal use of multiple concurrent internet protocol (ip) data streams for voice communications |
US10051644B2 (en) | 2015-07-31 | 2018-08-14 | T-Mobile Usa, Inc. | Transitioning a conversation between an unlicensed data network and a cellular network |
-
2015
- 2015-07-31 US US14/814,953 patent/US10051644B2/en active Active
-
2016
- 2016-07-15 WO PCT/US2016/042587 patent/WO2017023519A1/en active Application Filing
- 2016-07-15 CN CN201680044686.1A patent/CN107852652A/en active Pending
- 2016-07-15 EP EP16833499.3A patent/EP3314944A4/en not_active Withdrawn
-
2018
- 2018-06-29 US US16/024,092 patent/US10506614B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080119187A1 (en) * | 2001-02-26 | 2008-05-22 | Gallagher Michael D | Apparatus for Supporting the Handover of a Telecommunication Session Between a Licensed Wireless System and an Unlicensed Wireless System |
US20070083470A1 (en) * | 2005-10-12 | 2007-04-12 | Cingular Wireless Ii, Llc | Architecture that manages access between a mobile communications device and an IP network |
US20070149195A1 (en) * | 2005-12-27 | 2007-06-28 | Samsung Electronics Co., Ltd. | Apparatus and method for providing seamless handover |
CN101730093A (en) * | 2009-02-20 | 2010-06-09 | 中兴通讯股份有限公司 | Safe switching method and system |
US20110019639A1 (en) * | 2009-05-22 | 2011-01-27 | Jeyhan Karaoguz | Enterprise Level Management in a Multi-Femtocell Network |
CN103392319A (en) * | 2010-12-30 | 2013-11-13 | 交互数字专利控股公司 | Authentication and secure channel setup for communication handoff scenarios |
US20140286309A1 (en) * | 2011-12-23 | 2014-09-25 | Cellco Partnership (D/B/A Verizon Wireless) | Handing over a user device from one technology to another |
WO2013106536A2 (en) * | 2012-01-11 | 2013-07-18 | Interdigital Patent Holdings, Inc. | Method and apparatus for accelerated link setup |
US20150208309A1 (en) * | 2014-01-21 | 2015-07-23 | Cisco Technology, Inc. | System and method for seamless mobility in a network environment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112314033A (en) * | 2018-05-03 | 2021-02-02 | 诺基亚通信公司 | Selecting and managing network slices |
CN111669790A (en) * | 2019-03-08 | 2020-09-15 | 中国移动通信有限公司研究院 | Cell reselection or redirection method, device, network side equipment and terminal |
CN114788313A (en) * | 2019-10-16 | 2022-07-22 | 特鲁丰有限公司 | On-demand network connection |
Also Published As
Publication number | Publication date |
---|---|
EP3314944A4 (en) | 2018-11-21 |
EP3314944A1 (en) | 2018-05-02 |
US10506614B2 (en) | 2019-12-10 |
US20170034744A1 (en) | 2017-02-02 |
US20180324817A1 (en) | 2018-11-08 |
WO2017023519A1 (en) | 2017-02-09 |
US10051644B2 (en) | 2018-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107852652A (en) | The migration session between unauthorized data network and cellular network | |
EP3318084B1 (en) | Systems and methods for mobility management in a distributed software defined network packet core system | |
CN109391979B (en) | Method, device and system for restoring P-CSCF (proxy-Call Session control function) fault | |
CN108476448B (en) | Service processing method and IMS core network equipment | |
CN109729181A (en) | A kind of method for accessing domain name and equipment | |
CN109548093B (en) | Network switching method, device and system | |
CN102687582B (en) | Switching delay is optimized | |
EP2661941B1 (en) | Method of routing a session from a calling party in a serving communication network of the calling party to a called party | |
EP2974450B1 (en) | Communication handovers from networks using unlicensed spectrum to circuit-switched networks | |
CN107925703A (en) | Using temporary routing numbers audio call is originated from selected number | |
JP2013528993A (en) | Terminal capability acquisition method and system using terminal, HSS, and core network element | |
WO2019219619A1 (en) | Methods, system and nodes of optimized inactivity timer usage in 5gs | |
CN103619006B (en) | Method and system for achieving voice call service | |
US9271116B1 (en) | Location-based telephone calls over a wireless local area network (WLAN) | |
US10264619B2 (en) | Local call service control function server selection | |
EP3469822B1 (en) | Improved handling of ims services and emergency calls in a roaming scenario of a user equipment | |
US8224334B1 (en) | Calling connection for mobile communication | |
CN103561441A (en) | Dynamic strategy updating method and device based on timestamp | |
CN108260097B (en) | Method for solving roaming charging error during eSRVCC switching and eMSC | |
CN103118407B (en) | A kind of method and system for realizing reverse single-standby service continuity | |
CN101577674B (en) | Method for user terminal to access to home network PDN and visit network PDN | |
Brnovic | Trends in the evolution of voice services: A comprehensive survey | |
KR101638731B1 (en) | Apparatus and Method for processing VoLTE Originating Call | |
KR100965005B1 (en) | Apparatus and method for managing call session under IP based network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20210817 |